MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ad7e91af55a1e48ca702b1d8d4127a830688dd026df1c485a3e6c2bdd72ac336. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: ad7e91af55a1e48ca702b1d8d4127a830688dd026df1c485a3e6c2bdd72ac336
SHA3-384 hash: bcd29c620997212fbcba93ce4a73069a1863b32fafcd00b466f1d25f9220c20adf96697b086432489554310b61b9caa5
SHA1 hash: c4d20147bc88674ee827d992150be808a37d3294
MD5 hash: dddb306432509cb10e165663f8744585
humanhash: kilo-whiskey-mirror-delta
File name:update_2.exe
Download: download sample
Signature QuasarRAT
File size:29'184 bytes
First seen:2022-10-09 06:43:24 UTC
Last seen:2022-10-09 07:02:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9683ef79de5ce4e729e1231235baa48b (1 x QuasarRAT)
ssdeep 384:Vkbs/YT5B4DLXnNCkRfQUb9q7ZCVs67Kj5wWyb068sexmYS3R52y:DO2DnpZPb9q7ZC45wWyb068sexmN3rN
Threatray 5'311 similar samples on MalwareBazaar
TLSH T145D25B37B666DCC9E7392B74C4521A168C74396387708BCBF38502751DF2291FE26AE8
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Reporter JAMESWT_WT
Tags:afterburner-msi exe QuasarRAT

Intelligence


File Origin
# of uploads :
4
# of downloads :
430
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CallSleep
EvasionQueryPerformanceCounter
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
obfuscated
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Snort IDS alert for network traffic
Suspicious powershell command line found
Very long command line found
Yara detected Quasar RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Adware.RedCap
Status:
Malicious
First seen:
2022-09-24 22:01:05 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
17 of 26 (65.38%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Blocklisted process makes network request
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
a268b39ef100a8271e17f5bd64678c988cb6209d32b76ad7874c504f340c92f4
MD5 hash:
08c41b8ff5dce9624ccf01a854434635
SHA1 hash:
90775af8d275bf9147a7ab234d5ba9f9d39a1621
SH256 hash:
ad7e91af55a1e48ca702b1d8d4127a830688dd026df1c485a3e6c2bdd72ac336
MD5 hash:
dddb306432509cb10e165663f8744585
SHA1 hash:
c4d20147bc88674ee827d992150be808a37d3294
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:SUSP_PowerShell_Base64_Decode
Author:SECUINFRA Falcon Team
Description:Detects PowerShell code to decode Base64 data. This can yield many FP
Rule name:SUSP_PS1_FromBase64String_Content_Indicator_RID3714
Author:Florian Roth
Description:Detects suspicious base64 encoded PowerShell expressions
Reference:https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments